Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2021-34473

Description

Microsoft Exchange Server Remote Code Execution Vulnerability

POC

Reference

- http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html

Github

- https://github.com/0x3n0/redeam

- https://github.com/20142995/Goby

- https://github.com/20142995/nuclei-templates

- https://github.com/20142995/sectool

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/Advisory-Newsletter/Babuk-Ransomware

- https://github.com/ArtemCyberLab/Project-Lookback

- https://github.com/Astrogeorgeonethree/Starred

- https://github.com/Astrogeorgeonethree/Starred2

- https://github.com/Atem1988/Starred

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Dheerajmadhukar/karma_v2

- https://github.com/DiedB/caldera-precomp

- https://github.com/FDlucifer/Proxy-Attackchain

- https://github.com/GhostTroops/TOP

- https://github.com/HackingCost/AD_Pentest

- https://github.com/HimmelAward/Goby_POC

- https://github.com/Himnish/Cyber-9-12

- https://github.com/JERRY123S/all-poc

- https://github.com/KNIGHTPROJEKS-0/LANCELOTT

- https://github.com/Ly4j/Exchange-ProxyShell-exp

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/R1card0-tutu/Red

- https://github.com/RaouzRouik/CVE-2021-34473-scanner

- https://github.com/RomanRII/proxyshell2rce

- https://github.com/SYRTI/POC_to_review

- https://github.com/StarCrossPortal/scalpel

- https://github.com/T0mcat3r/ALinks

- https://github.com/Threekiii/Awesome-Redteam

- https://github.com/TreWilkinsRC/iis_parser

- https://github.com/Vluthor/Threat-Detection-SOC-Analysis

- https://github.com/W01fh4cker/Serein

- https://github.com/Wh1teHatUn1c0rn/RedOps-Framework

- https://github.com/WhooAmii/POC_to_review

- https://github.com/Z0fhack/Goby_POC

- https://github.com/anonymous364872/Rapier_Tool

- https://github.com/apif-review/APIF_tool_2024

- https://github.com/apit-review-account/apit-tool

- https://github.com/aravazhimdr/ProxyShell-POC-Mod

- https://github.com/but43r/ProxyShell

- https://github.com/c04ch1337/metasploit_docker

- https://github.com/c0mrade12211/Pentests

- https://github.com/certat/exchange-scans

- https://github.com/cryptoforcecommand/log4j-cve-2021-44228

- https://github.com/curated-intel/Log4Shell-IOCs

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/cyberheartmi9/Proxyshell-Scanner

- https://github.com/danyk20/pentest

- https://github.com/demining/Log4j-Vulnerability

- https://github.com/f4alireza/CVE

- https://github.com/gobysec/Goby

- https://github.com/hackingmess/HIVE-INDICADORES-DE-COMPROMISO-IOCs

- https://github.com/hktalent/TOP

- https://github.com/horizon3ai/proxyshell

- https://github.com/hosch3n/ProxyVulns

- https://github.com/huike007/penetration_poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/ipsBruno/CVE-2021-34473-NMAP-SCANNER

- https://github.com/izj007/wechat

- https://github.com/jbmihoub/all-poc

- https://github.com/je6k/CVE-2021-34473-Exchange-ProxyShell

- https://github.com/jrgdiaz/ProxyShell-CVE-2021-34473.py

- https://github.com/kh4sh3i/ProxyShell

- https://github.com/kh4sh3i/exchange-penetration-testing

- https://github.com/koorchik/dissert

- https://github.com/koorchik/llm-analysis-of-text-data

- https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest

- https://github.com/learningsurface/ProxyShell-CVE-2021-34473.py

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/merlinepedra/RedTeam_toolkit

- https://github.com/merlinepedra25/RedTeam_toolkit

- https://github.com/mithridates1313/ProxyShell_POC

- https://github.com/n0-traces/cve_monitor

- https://github.com/nitish778191/fitness_app

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/nullx3d/PaypScan

- https://github.com/osogi/NTO_2022

- https://github.com/p2-98/CVE-2021-34473

- https://github.com/pen4uin/awesome-vulnerability-research

- https://github.com/pen4uin/vulnerability-research

- https://github.com/pen4uin/vulnerability-research-list

- https://github.com/phamphuqui1998/CVE-2021-34473

- https://github.com/pondoksiber/Catatan_CVE

- https://github.com/psc4re/NSE-scripts

- https://github.com/pwnlog/ALinks

- https://github.com/pwnlog/PAD

- https://github.com/pwnlog/PuroAD

- https://github.com/pwnlog/PurpAD

- https://github.com/r0eXpeR/supplier

- https://github.com/rastidoust/Red

- https://github.com/rastidoust/rastidoust.github.io

- https://github.com/retr0-13/proxy_Attackchain

- https://github.com/sahar042/Shodan-IDOR

- https://github.com/sahar042/Shodan-IDOR-2

- https://github.com/shanyuhe/YesPoc

- https://github.com/shubhamrooter/ShodanSpider

- https://github.com/signorrayan/RedTeam_toolkit

- https://github.com/soosmile/POC

- https://github.com/superzerosec/poc-exploit-index

- https://github.com/swaptt/swapt-it

- https://github.com/trhacknon/Pocingit

- https://github.com/triw0lf/Security-Matters-22

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/youcans896768/APIV_Tool

- https://github.com/zecool/cve